Agenda

08:30 - 09:15PANEL DISCUSSION"The Challenges of Aligning IT and the Business"

“IT alignment” has been for some time, and continues to be, a major challenge for IT leaders. This idea of “aligning” the IT group with the rest of the organization is a persistent puzzle that causes many IT leaders to lose sleep. Yet despite the unrelenting attention to this topic, a clear working template or solution doesn’t appear to be any more evident.

How can IT align with the business when the business itself does not have a strategy in place? Should they be separate strategies or can they be created as one? This session aims to identify the key challenges IT and digital leaders face and how this can ultimately be overcome.

09:20 - 10:05BOARDROOM BRIEFING #1"Walking in the Shoes of the Aldo Consumer"

Come listen to the reasons why it is so important to have a complete view and understanding of your consumers. Zack is going to walk you through a new initiative at Aldo around the 360 view of their consumers. With nearly 200 million consumers visiting Aldo stores yearly it was time for us to get a little more intimate with each and everyone of them. Learn about our analytics, data governance and architectural strategies to support this impressive initiative as well as the challenges with such a large and complex deployment

Complex infrastructure, overlapping domains, and rigorous compliance requirements complicate a growing influx of data from multiple internal and external sources. Successful organizations combat this by leveraging a value generation cycle, or determining the value your data can provide and then using the right technology to deliver real results.

In this session, you'll learn how to derive lasting value from your data. Uncover 5 steps to making this happen, plus case studies on how real businesses laid the foundation for measurable business success.

SESSION LEADER:Porter Thorndike, Director, Information Builders

09:20 - 10:05BOARDROOM BRIEFING #3"State of Cyber Threats in Canada"

Cyber threats continue to target organizations causing significant business and reputational impact and Canadian organizations are no exception. In this session, Mandiant provides a recap of a few interesting recent cases and provide lessons learned and insight on steps leading organizations are taking to improve the resiliency of their cyber security programs.

While blockchain is among the hottest technologies in the enterprise security, data storage and file-sharing arenas, many experts question its use or even whether it's really as secure as billed.

The technology has grown in popularity but, many experts are still not sure exactly how it works. This session will focus on the real power of blockchain. Is it just a buzzword, or is it the invisible technology that will change the world?

Artificial intelligence is taking off. There is now a lot more data available and affordable, powerful systems to crunch through it all. It's also much easier to get access to powerful algorithm-based software in the form of open-source products or embedded as a service in enterprise platforms. A new generation of business analysts means organizations are also more comfortable with manipulating business data through the use of machine learning.

This sessions aims to take a look at the effect of AI and machine learning on the enterprise and the limitations of these technologies even as they start bringing real-world benefits.

Security breaches. Phishing. Malware. Whenever a security attack succeeds, the first reflex is often to blame the end user as the weakest link. While end users are a point of vulnerability, what if they could become part of the solution? That’s the question André Boulianne and his security team at CDPQ asked themselves. Instead of focusing on the blaming game, Boulianne’s team decided to put user experience and innovation at the heart of the security program. The result? Security is now fully integrated in the corporate reputation risk management strategy.

Analytics can be a powerful contributor to the achievement of departmental and organizational goals. But successfully deploying analytics in any organization can be challenging and a number of common questions generally arise such as: Where do I start? Which projects should be prioritized? How should my organization be structured for success? What about data? And how do you prevent your teams from reverting back into old habits?

Organizations are using powerful cloud technologies to transform how they operate and deliver on rising customer expectations. But many still struggle to realize the benefits of those tools, in great part due to low levels of digital adoption. In this presentation we'll discuss pragmatic and proven adoption techniques that are helping drive digital transformation in large well-established organizations.

Whether you’ve already migrated workloads to the Cloud or are considering a migration in the coming year, you will find this discussion highly informative. It’s the dream scenario for many companies: after many hurdles, endless internal stakeholder meetings, and long hours with your project team you’ve finally completed your first large cloud migration and are finally in the Happily Ever After stage of Cloud migration. What happens now? Chris Falk, CTO of Buyatab, will join Jarrod Levitan, CEO of TriNimbus, to share his company's cloud journey and what they're doing today to be successful in this ever changing post migration landscape. The discussion will include what happens during and after Cloud migration and ways that you can leverage Cloud technologies to successfully stay ahead of the curve. Key takeaways: • Learn about the essential building blocks of a successful Cloud Migration • Hear about life post-migration • Methods and tools needed to optimize your Cloud environment while keep it secure and compliant • How to build continuous innovation into your Cloud strategy to keep you ahead of your competitors.

Building a digital business involves creating new operations that support doing business digitally and take advantage of digital systems. New digital business companies that enter the marketplace and existing companies that add digital business arms increase pressure on their competitors to transition quickly to digital.

This interactive roundtable discussion will provide attendees to brain-storm and share ideas with one another on how to effectively orchestrate digital transformation.

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

As over-used as the word “innovation” may be these days, there is no denying that building a culture of innovation is at the top of most corporate agendas. After all, a company’s own employees are uniquely positioned to understand the intersection of business operations, product development pipelines, and customer demand. New growth should be spurred from within. Yet attempts to build a culture of adopting innovation often fall flat.

This session will focus on how to harbor an adoptive culture of innovation within your team and organization.

Content is a core element of digital business. Companies must create, secure, manage, and collaborate upon content with both internal and external participants. But traditional Enterprise Content Management (ECM) technology is costly and dated while Enterprise File Share & Sync (EFSS) is limited in functionality. The result? Too many content repositories, leading to silos and broken communication. Companies need a better way to work!

Learn how to make the most of your content investment and drive innovation through IT.

In such a hyperconnected world, cybersecurity is not just about protecting data, but also protecting people – the secure flow of information is both mission- and safety-critical. When everything is connected, everything is a target. And if even a single endpoint in a system is unprotected, nothing is secure. Securing the Enterprise of Things is a massive undertaking, and requires a completely new approach to cybersecurity. This session will present on the Enterprise of Things Maturity Model and uses what we learned from the mobility revolution to anticipate changes to technology and, importantly, what it means to businesses as they mature. How mature and secure is your transformation in the digital era?

The convergence of operational technologies (OT) and Information technologies (IT) is a trend that is gaining more and more leverage when companies want to maximize digital transformation. Although IT and OT come from different worlds, they have evolved in recent years on a similar trajectory, complementing one another to make a highly strategic lever to support the business plan. In 2016 the Société de Transport de Montréal (STM) began this shift. This session will share its roadmap as well as the benefits and challenges.

The modern Cloud Era has fundamentally reset expectations of enterprise IT services. Internal and external consumers of these IT resources demand the same agility and scalability of public clouds. As a result, today’s decision makers need to bring true cloud-like simplicity and flexibility to their datacenters to stay competitive, and to support their business.

To build their next-generation infrastructure, enterprise IT leaders are looking beyond their legacy vendors and architectures, and are building datacenters that rival public clouds. What does this new enterprise IT stack look like, and how can decision makers leverage the latest innovations as they put their datacenter and cloud strategies into practice

Join Nutanix to provide you with a deeper understanding of how to confidently tackle these important decision maker's challenges.

SESSION LEADER:Justin Hurst, Director of Technology, Nutanix

16:30 - 17:15KEYNOTE PRESENTATION"From Atom to Bits (and back again)"

After almost a quarter of a century of “being digital” where are our organizations? Why do we still need the consulting firms of the world to publish manifestos and howtos about “organizing for a digital world” or “the case for digital reinvention”? Is there a digital divide in the C suite? Will startups really disrupt incumbents? Do you have FOMO? Did it really take 25 years to get from “New Information and Communications Technologies” to ICT, to IT… can we agree just on the “T” now? Or do we call it Innovation? Free advice: it will not worked out as planned. This session will hopefully provide as many answers as questions and the speaker sure hopes to make it as entertaining as though provoking.